Abstract
Research into a pandemic like Covid-19 needs a tremendous input of patient histories and characteristics. Patients and doctors are only willing to share these sensitive data when they are ensured that the data are solely used by legitimate research laboratories. Asymmetric group key agreement (AGKA) protocols provide a good cryptographic primitive to address this requirement. The AGKA protocols proposed in literature provide users with a common public group key and a different decryption key by relying on compute intensive pairing operations. In this paper, we propose a new primitive, called the Common AGKA (CAGKA) protocol in which the users share the same private-public key pair, resulting in a more efficient solution. By combining Elliptic Curve Qu Vanstone certificates and a recently proposed Canetti–Krawczyk (CK) secure mutual authentication protocol, a one round self-certified pairing free CAGKA protocol is defined, which can be also globally certified after one additional round.
Keywords: Asymmetric group key, Elliptic curve cryptography, Implicit certificates, Canetti–Krawczyk (CK) security
Introduction
Group key agreement protocols in literature can be distinguished into two categories, being the ones that lead to the construction of a common shared secret symmetric key and the ones resulting in a common shared public key. This last category is also called the asymmetric group key agreement (AGKA) protocol and has been proposed in [1]. In their definition and also the other follow-up constructions [2–6], the individual users of the group possess their own corresponding private key, which is different from the other participants of the group.
For symmetric group key agreement (SGKA) protocols, there is a group coordinator required, which chooses the key and shares it among the different members based on the individual input of the different members using secret sharing techniques (for instance by means of Lagrange interpolation). An SGKA protocol relying on solely symmetric key based operations has been proposed in [7] and a mutual authenticated SGKA protocol based on Elliptic Curve Cryptography (ECC) is presented in [8]. Recently, in [9], another ECC based SGKA scheme has been proposed, offering in addition resistance to ephemeral key compromise attacks. These attacks exploit the knowledge of random values used in the scheme, e.g. leaked by time analysis or other side channel techniques, to retrieve the session key. Besides the vulnerability for key escrow in SGKA protocols, this approach is also not advisable in case not all participants of the group possess “read” rights. For instance, in the use case of data sharing from individuals to a group of trusted laboratories, the individuals should not be able to derive the input of others.
Instead, the AGKA protocols provide a perfect solution to distinguish between users with only “write” rights and users with both “read” and/or “write” rights. The AGKA protocols are distributed one-round protocols, that do not require the different users to stay online to concurrently run the protocol. The latest generation of AGKA protocols is designed to enable the users without additional communication rounds to verify the correctness and authentication of the other participants, taking into account both passive and active attackers [3–6]. There are also some schemes that associate attribute based control to the construction of the AGKA protocols [10–12].
However, all of these schemes are relying on compute intensive pairing operations, used both in the key agreeement phase and in the actual encryption/decryption process afterwards. Moreover none of them are able to offer ephemeral key compromise protections and only allow certification of the public key among the group members.
To conclude, in order to offer a viable solution for data sharing, the objective in this paper is to focus on the construction of an AGKA variant protocol to address the above mentioned shortcomings. This results in the following contributions.
We argue the usefulness of having different decryption keys as in the AGKA protocols in literature and define the Common AGKA (CAGKA) protocols in which users share the same private-public key pair.
We propose a single round pairing free CAGKA protocol applicable for users being certified by different certificate authorities (CAs) and offering protection in the Canetti–Krawczyk (CK) security model [13], where an adversary is also able to reveal session state specific information, session keys, or long-term private keys. This automatically implies the presence of perfect forward secrecy and protection against the ephemeral key compromise attack.
We propose an additional round to enable implicit certification, allowing other parties to verify the certificate of the group key by integrating the Elliptic Curve Qu Vanstone (ECQV) certificates [14].
Related Work
The AGKA protocol has been introduced by Wu et al. in 2009 [1]. Their proposed protocol consisted of a single round, enabling each participant to publish independently their public key contribution, without the need of being connected during the protocol. First, it was defined for a fixed group, later for a dynamic group [2]. Different types of features have been added to the AGKA protocols in later years. In [5], Ranjani et al. propose an ID-based approach to protect against active attacks and to avoid reliance on a trusted dealer. Since the group controller distributes the secret keys to the other participants, the scheme is vulnerable for key escrow. In addition, it also suffers from the ephemeral key compromise attack. In [4], Lv et al. proposed the combination with a certificateless public key cryptosystem to avoid key escrow and to enable the members of the group to self-certify the resulting public key in a single round. The scheme is not resistant against the ephemeral key compromise attack and is not able to offer perfect forward secrecy in which the previous session keys are protected even if the secret key of one of the participants leaks. In [3], Zhang et al. propose a cross domain self-certified authenticated group key protocol, in which the users can come from different authorization domains. Their protocol assumes the existence of a so called alliance public key between the different certificate authorities. The construction of this key has not been explained. In fact, its construction can be made by our CAGKA protocol. In addition, no perfect forward secrecy is obtained and there is also no protection against the ephemeral key compromise attack. Finally, there is the scheme of Chen et al. [6], in which also an identity-based cross-domain authenticated asymmetric group key is established. Here the validity of the public keys is guaranteed by the three-layer cross domain network architecture. This scheme satisfies forward secrecy, but offers still no protection against the ephemeral key compromise attack.
In all of the approaches mentioned above, only the members of the group are able to verify the validity of the group key. To conclude, as far as the authors are aware, all the proposed asymmetric group key agreement protocols are pairing based, which are very compute intensive cryptographic operations.
Preliminaries
Cryptographic Operations
The underlying cryptographic operations used in this paper are based on Elliptic Curve Cryptography (ECC). In ECC, an elliptic curve (EC) over is considered with generator G of order q. The security in ECC relies on the hardness of both the Elliptic Curve Discrete Logarithm Problem (ECDLP) and the Elliptic Curve Diffie Hellman Problem (ECDHP). In ECDLP, it is computationally hard for any polynomial-time bounded algorithm to determine a parameter for which , given Q and G. ECDHP states that given xG, yG, it is computationally hard to derive xyG.
We further utilise two basic symmetric key based primitives, a hash algorithm and symmetric key encryption/ decryption. The hash of a concatenated message , is denoted by and results in an output of fixed length. The hash function should offer protection against collision, pre-image and second-image attacks. The symmetric key encryption encrypts a message M into a ciphertext C such that using the shared secret key K. The decryption is denoted by .
The scheme is built upon the combination or integration of two primitives, described in literature.
Elliptic Curve Qu Vanstone (ECQV) Certificates
ECQV certificates [14] enable a participant to derive a secret key without the need for a secure channel and without the Certificate Authority (CA) knowing this secret. In addition, based on identity and certificate, any other participant is able to derive the corresponding public key. The protocol consists of two rounds. First the participant with identity chooses a random variable and computes . The message is sent to the CA, who possesses the private-public key pair , where is publicly known and certified to all users. Here, the CA also chooses a random variable to derive and defines the certificate . Next, the CA determines auxiliary information and sends to . Based on this information, is able to derive its private key . If , then accepts the key pair .
Authentication Protocol Secure in CK Model
In [15], a highly efficient elliptic curve (EC) based mutual authentication protocol between a smart meter and service provider satisfying security in the CK security model has been presented. Let the smart meter possess the key pair together with random EC point and the service provider possess with . Only the EC points are publicly available. Then, the protocol defines the session key SK as
with and .
Security Model
In our setting, we assume n users aiming to generate a common private-public key pair, where is responsible for the selection of the participating users and the initial collection of the key material, which should be made publicly available in order to initiate the actual protocol. Next, the users broadcast their contribution to the group key over an open public channel.
We further consider the existence of a passive and active attacker. As a consequence, messages sent in the open channel can not only be eavesdropped, but can also be captured, removed, and changed and even new messages can be inserted.
In addition, we also assume that the attacker is able to retrieve the long term secret private key or session specific random values of the users participating in the protocol, cf. the CK security model.
Moreover, also the existence of malicious insider users are considered, which try to impersonate legitimate users.
SGKA, AGKA and CAGKA Protocols
The main underlying difference between AGKA and CAGKA type of protocols is that in CAGKA all users share the same private key. The private key in AGKA is only used for decryption of the messages, which are encrypted with the public group key. In both AGKA and CAGKA, if a user is compromised, a remove user procedure should be installed, where all users need to restart the key agreement procedure. Consequently, no direct advantages, both from a security or efficiency point of view, are linked to AGKA compared to CAGKA.
One could say that SGKA can be easily transformed to CAGKA protocols by considering the resulting shared symmetric key as the private key. However, the main difference between SGKA and CAGKA is that SGKA still remains vulnerable for key escrow attacks.
Proposed Scheme
We consider four main phases in the proposed scheme. First, there is the registration phase, followed by the self-certified group key agreement phase and optionally further finished by the CA-certified group key agreement phase. Finally, there is also the group update phase in which a user leaves or joins the group.
Registration Phase
In the registration phase, the different participants for derive a key pair by its CA via ECQV. Denote the corresponding certificate by and public key of the CA by . For ease in notation, we here consider the existence of one CA, but with additional cost of publishing the CA public key, the participants can be connected also to different CAs like in [3].
Self-certified Group Key Agreement Phase
To start, each user for willing to participate in the group needs to publish its identity , certificate and EC point constructed as with a randomly chosen value. The group controller, e.g. makes sure that this information is available.
Next, any user with chooses a random value and computes for all users with , . Then, the secret shared key with hashes and between is derived by the CK mutual authentication scheme of [15]. This results in the parameter , which is sent together with to all other users .
Consequently, each user with is now able to derive from the available information of the shared key by computing with and between and retrieve by . If corresponds with the published EC point , user is guaranteed of the integrity and authentication of the value. After repeating this process for the users, a legitimate participant is then able to derive the asymmetric private group key and the corresponding public group key by where .
CA-Certified Group Key Agreement Phase
In the previous process, only the members of the group are ensured about the legitimacy of the other participants. An outsider receiving the group public key cannot verify the relation with the involved entities. Therefore, the ECQV mechanism is now applied on top of the previous phase.
For this, similar as in ECQV, the CA chooses a random value and computes . The resulting certificate becomes . Define . The auxiliary value equals to and sends to . Based on this information, each is able to derive the private key . If , the accepts the key pair .
Group Update Phase
In case a user leaves or enters the group, the other users can keep the random value , resulting in the same session keys with the other still remaining users . Only the value should be updated in order to guarantee perfect forward and backward security. Note that after a fixed time or a certain amount of key update phases, each user needs to refresh the random key . It is of course a trade-off in storing these common shared keys (efficiency) and recomputing the keys/redefining random values (security) and is mainly determined by the frequency of updates. The new user follows the same procedure as mentioned in the self-certified group key agreement phase. For the resulting group key, a CA-certified group key agreement phase can also be defined.
Security Analysis
An asymmetric group key agreement protocol is secure if it is able to guarantee that only the intended users of the group are able to compute the private group key. For this type of protocol, several generally accepted desirable security properties are defined [16].
Known-key security ensures that if the protocol is successfully finished, each legitimate participant is able to compute the unique private key. Even if group private keys of some previous sessions are leaked, the security of the private keys in the other sessions is not compromised. This feature is clearly valid in our proposed scheme due to the usage of different random values in each protocol run and the protection against the ephemeral key compromise attack, inherently present in the CK security model applicable in the construction of the keys .
Unknown key-share security guarantees that all users are the real users as claimed during the group construction. The established session keys among the pairs of users can only be derived by the true users as they claimed to be. This follows immediately from the construction of the symmetric keys used to encrypt the values , which is based on both the mutual CK secure authentication protocol of [15] and the ECQV protocol.
Key compromise impersonation security ensures that if an attacker is able to compromise the long term private key of a user and thus to impersonate that user, the impact should be limited to that user. This feature is inherently present in the CK security model and thus valid thanks to the usage of the mutual CK secure authentication protocol of [15].
Key control security states that none of the users is capable to force the session key to be a preselected value. The other users are not able to change the chosen parameters of the other users without being noticed. Although, a legitimate user (with ) is able to derive the input of the published outputs , it is not able to retrieve since symmetric key cryptographic protocols are designed to resist such known-plaintext attacks.
The formal security of the proposed protocols described in Sect. 4 can be easily deducted from the security of the two underlying primitives.
Theorem 1
The self-certified group key agreement phase offers session key security under the CK adversary model [13] and in the random oracle model.
The self-certified group key agreement phase between n participants is built upon applications of the mutual CK secure authentication protocol of [15]. The security of this protocol has been proven in the random oracle model in [15] and is strongly related to the computational hardness of the ECDH problem and the collision resistance of the hash function. The same conclusions of [15] on the advantage of the adversary in attacking the protocol can thus made here.
Theorem 2
The CA-certified group key agreement phase is secure in the random oracle model.
This protocol is a direct application of the ECQV protocol, whose security has been formally proven in [17] and relies on the fact that the ECDLP is intractable.
Table 1 provides an overview of the differences in security features between several other AGKA and SAGKA protocols in literature. From this table, we can conclude that our proposed protocols are the only ones offering CK security, i.e. satisfying both resistance to the ephemeral key compromise attack and perfect forward secrecy, among the AGKA protocols. In addition, our CA certified group key agreement protocol is the only one in literature offering a global certificate to the resulting group key.
Table 1.
Comparison of security features, where V1 denotes the self certified version and V2 the global CA certified version (Y=Yes, N=No)
Efficiency Analysis
Computational Costs
For the efficiency analysis, we consider 160-bit security level and use the performance results of the different cryptographic operations as mentioned in [3, 18]. There, the results are obtained after implementation of the cryptographic primitives on an Intel R Core RM 2 Duo E8400 CPU3 (3.00GHz) ubuntu 10.04.
Table 2 compares the number of most compute intensive operations between the proposed CAGKA protocol and [3–6, 9] for the key agreement phase, the encryption and decryption using the derived key. Denote the pairing operation as a function and define the EC also in . We then denote by the time cost for a modular multiplication in , the time cost for a modular exponentiations over , and the time cost for a pairing operation. Note that for our protocol, we here consider the usage of the ECIES encryption protocol [19] for the encryption/decryption, while in [9] only a symmetric key encryption is required. Since this is negligible compared to the rest, we keep the corresponding entries empty in the table.
Table 2.
Comparison of computational complexity, where V1 denotes the self certified version and V2 the global CA certified version
The impact on the efficiency between the different protocols increases with increasing number of participants and has been shown in Fig. 1. For instance, in our self-certified protocol, a group of 100 participants is able to derive the group key in only 11 ms, while it takes 14 ms, 21 ms, 440 ms, 876 ms and 1990 ms in [3–6, 9] respectively. Due to the high number of [5], the performance of this scheme is omitted in Fig. 1. The global CA certified version takes approximately 111 ms, which is still better than most of the other schemes. It should be noted that the scheme of [6] is very efficient, compared to the other pairing based schemes as it only requires a fixed number of pairing operations in the key construction, independent of the group size. For values of n larger than 410, the scheme of [6] even outperforms the proposed CAGKA scheme. To summarize, our protocol behaves best for the key agreement phase, even better than the SGKA protocol for group sizes smaller than 410. Also, with respect to encryption and decryption, the difference is huge compared to the other AGKA protocols.
Fig. 1.

Performance comparison for a varying number of participants (Note that the results of [5] are omitted due to the very high numbers.)
Communication Costs
For analyzing the communication costs, we consider again the 160-bit security level.
Next, we also derived the communication cost with respect to the number of sent and received bits. Figures 2, 3 and 4 show the evolution in terms of groups size for the number of bits sent, received and total amount of bits sent and received respectively. With respect to sent bits, our both schemes outperform the other schemes, followed by the schemes of [3, 4, 6]. The number of bits sent by [9] is almost 10 times higher than CAGKA. The number of bits sent by [5] is almost 15 times higher than the CAGKA scheme. For the amount of received bits, the scheme of [3] slightly outperforms the CAGKA schemes. The scheme of [4] has also similar results with respect to number of transmitted bits. The other schemes have a significantly higher communication overhead. Combining then the numbers of sent and received bits, it can be concluded that the proposed CAGKA protocols outperform the other protocols. Only the protocol of [3] is in the same range, followed by [4]. The other schemes [5, 6, 9] have significant higher costs.
Fig. 2.

Number of transmitted bits (Note that the results of [5] are omitted due to the very high numbers.)
Fig. 3.

Number of received bits
Fig. 4.

Total amount of sent and received bits
Conclusion
We have introduced a new cryptographic primitive, called the common asymmetric group key agreement protocol (CAGKA), which has clear advantages compared to both AGKA and SGKA protocols. First, it avoids key escrow, which is inherently presence in SGKA protocols and second, it is much more efficient compared to AGKA protocols. We rely on ECC based mechanisms and develop by means of ECQV and a CK resistant mutual authentication protocol of [15], a one round self-certified pairing free CAGKA protocol. A global certification can be added after one additional round by applying the ECQV mechanism again. We show that these primitives outperform the state of the art with respect to security strength, computation and communication cost.
The scheme is very useful for scenarios of information sharing between users with different access rights, like eg. sharing of medical information among a group of experts. This can also be generalised to applications in wireless sensor networks, where the cluster heads take the role of participants and the sensors only need to securely transmit their information to this group. It can for instance result in facilitating the handover process of dynamic sensors crossing regions covered by the different cluster heads.
An Braeken
obtained her MSc Degree in Mathematics from the University of Gent in 2002. In 2006, she received her PhD in engineering sciences from the KULeuven at the research group COSIC (Computer Security and Industrial Cryptography). She became professor in 2007 at the Erasmushogeschool Brussel (currently since 2013, Vrije Universiteit Brussel) in the Industrial Sciences Department. Prior to joining the Erasmushogeschool Brussel, she worked for almost 2 years at the management consulting company Boston Consulting Group (BCG). Her current interests include security and privacy protocols for IoT, cloud and fog, blockchain and 5G security. She is (co-)author of over 120 publications. She has been member of the program committee for numerous conferences and workshops (IOP2018, EUC 2018, ICNS 2018, etc.) and member of the editorial board for Security and Communications magazine. She has also been member of the organizing committee for the IEEE Cloudtech 2018 conference and the Blockchain in IoT workshop at Globecom 2018. In addition, she is since 2015 reviewer for several EU proposals and ongoing projects, submitted under the programs of H2020, Marie Curie and ITN. She has cooperated and coordinated more than 12 national and international projects. She has been STSM manager in the COST AAPELE project (2014-2017) and is currently in the management committee of the COST RECODIS project (2016-2019).
Declarations
Conflicts of interest
This research has been funded by the Tetra grant OpenCloudEdge. There are no conflicts of interest. Additional data can be given on demand.
Footnotes
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Wu, Q., Mu, Y., Susilo, W., Qin, B., & Domingo-Ferrer, J. (2009). Asymmetric group key agreement. In Proceedings EUROCRYPT, Lecture Notes in Computer Science (Vol. 5479, pp. 153–170). Springer.
- 2.Wu Q, Mu Y, Susilo W, Qin B, Domingo-Ferrer J. Provably secure one-round identity based authenticated asymmetric group key agreement protocol. Information Sciences. 2011;181(19):4318–4329. doi: 10.1016/j.ins.2011.05.009. [DOI] [Google Scholar]
- 3.Zhang Q, Gan Y, Zhang Q, Wang R, Tan YA. A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application. IEEE Access. 2018;6:24064–24074. doi: 10.1109/ACCESS.2018.2799007. [DOI] [Google Scholar]
- 4.Lv X, Li H, Wang B. Authenticated asymmetric group key agreement based on certificateless cryptosystem. International Journal Computer Mathematics. 2014;91(3):447–460. doi: 10.1080/00207160.2013.806653. [DOI] [Google Scholar]
- 5.Ranjani RS, Bhaskari DL, Avadhani PS. An extended identity based authenticated asymmetric group key agreement protocol. International Journal Network Security. 2015;17(5):510–516. [Google Scholar]
- 6.Chen A, Hu C, Chen A, Zheng Q. An identity-based cross-domain authenticated asymmetric group key agreement. Information. 2021;12:112. doi: 10.3390/info12030112. [DOI] [Google Scholar]
- 7.Carlier M, Steenhaut K, Braeken A. Symmetric-key-based security for multicast communication in wireless sensor networks. Computers. 2019;8(1):27. doi: 10.3390/computers8010027. [DOI] [Google Scholar]
- 8.Porambage P, Braeken A, Schmitt C, Gurtov A, Ylianttila M, Stiller B. Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access. 2015;3:1503–1511. doi: 10.1109/ACCESS.2015.2474705. [DOI] [Google Scholar]
- 9.Mandal S, Mhohant S, Majhi B. CL-AGKA: Certificateless authenticated group key agreement protocol for mobile networks. Wireless Networks. 2020;26:3011–3031. doi: 10.1007/s11276-020-02252-z. [DOI] [Google Scholar]
- 10.Zhao X, Zhang F, Tian H. Dynamic asymmetric group key agreement for ad hoc networks. Ad Hoc Networks. 2011;9(5):928–939. doi: 10.1016/j.adhoc.2010.11.002. [DOI] [Google Scholar]
- 11.Zhang Q, Ma Z, Tan Y. An authenticated asymmetric group key agreement for imbalanced mobile networks. Ad Hoc Networks. 2014;23(4):827–835. [Google Scholar]
- 12.Gan Y, Wang B, Zhuang Y, Gao Y, Li Z, Zhang Q. An asymmetric group key agreement protocol based on attribute threshold for Internet of Things. Trans Emerging Tel Tech. 2020;2020:e417. [Google Scholar]
- 13.Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. In EUROCRYPT, Lecture Notes of Computer Science (Vol. 2045, pp. 453–474). Springer.
- 14.Qu, M., & Vanstone, S. (1997) . Implicit Certificate Schemes, preprint
- 15.Braeken A, Kumar P, Martin A. Efficient and provably secure key agreement for modern smart metering communications. Energies. 2018;11(10):2662. doi: 10.3390/en11102662. [DOI] [Google Scholar]
- 16.Burmester M, Desmedt Y. A secure and efficient conference key distribution system. Eurocrypt. 1994;1994:275–286. [Google Scholar]
- 17.Brown, D. R. L., Gallant, R., & Vanstone, S. A. (2001). Provably secure implicit certificate schemes. In Financial cryptography, lecture notes in Computer Science (Vol. 2339, pp. 56–165). Springer.
- 18.Wei G, Yang X, Shao J. Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Transactions Internet Information Systems. 2012;6(12):3352–3364. [Google Scholar]
- 19.Smart, N. P. (2001). The exact security of ECIES in the generic group model. In Cryptography and coding, lecture notes in computer science (Vol. 2260, pp. 73–84). Springer.
